Abstract
In ambient environments, new security challenges that are not adequately addressed by existing security models appear. In such context, intelligent communication devices participate to spontaneous and self-organized networks where unexpected interactions with unknown devices take place. Without centralized organization, security turns in a risk management problem.
In this paper we propose and analyze a computational model of trust that captures trust dynamics of the human society. In our model, past experiences and recommendations are aggregated in the notion of history of past interactions which are protected by cryptographic material. To avoid the trust dissemination, each entity is viewed as an autonomous device and a trust level is computed based only upon selfish evaluation of common trustworthy nodes. Our proposal reduces the complexity of the decision-making process by providing proved data that can be the foundation of the final decision. The proposed trust model is described together with an overview of the cryptographic protocol and its security analysis. The trust function is analyzed through intensive simulations depending on the impact of the chosen parameters of the trust evaluation and on the dynamics of the studied groups.
Please use the following formal when citing this chapter: Galice, S., Minier, M. and Ubéda, S., 2007, in IFIP International Federation for information Processing, Volume 238, Trust Management, eds. Etalle, S., Marsh, S., (Boston: Springer), pp. 169–184.
Chapter PDF
Similar content being viewed by others
References
The First International Joint Conference on Autonomous Agents & Multiagent Systems, AAMAS 2002, July 15–19, 2002, Bologna, Italy, Proceedings. ACM, 2002.
Matt Blaze, Joan Feigenbaum, John Ioannidis, and Angelos D. Keromytis. The KeyNote Trust-Management System Version 2 — RFC 2704. RFC 2704, Available from http://www.faqs.org/rfcs/rfc2704.html, September 1999.
Matt Blaze, Joan Feigenbaum, and Angelos D. Keromytis. The role of trust management in distributed systems security. In Jan Vitek and Christian Damsgaard Jensen, editors, Secure Internet Programming, volume 1603 of Lecture Notes in Computer Science, pages 185–210. Springer, 1999.
Matt Blaze, Joan Feigenbaum, and Jack Lacy. Decentralized trust management. In IEEE Symposium on Security and Privacy, pages 164–173. IEEE Computer Society, 1996.
Dan Boneh and Matthew K. Franklin. Identity-based encryption from the weil pairing. In Advances in Cryptology — Crypto’ 2001, volume 2139 of Lecture Notes in Computer Science, pages 213–229. Springer, 2001.
Licia Capra. Engineering human trust in mobile system collaborations. In Richard N. Taylor and Matthew B. Dwyer, editors, SIGSOFT FSE, pages 107–116. ACM, 2004.
Xiofeng Chen, Fangguo Zhang, and Kwandjo Kim. A new ID-based group signature scheme from bilinear pairings. In Information Security Applications, 4th International Workshop — WISA’ 03, volume 2908 of Lecture Notes in Computer Science, pages 585–592. Springer-Verlag, 2003.
Samuel Galice, Marine Minier, John Mullins, and Stéphane Ubéda. Cryptographic protocol to establish trusted history of interactions. In Third European Workshop on Security and Privacy in Ad hoc and Sensor Networks, page LNCS 4357, September 2006.
Diego Gambetta. Can we trust trust? In Diego Gambetta, editor, Trust: Making and Breaking Cooperative Relatioins, chapter 13, pages 213–237. Published Online, 2000.
Tyrone Grandison and Morris Sloman. A survey of trust in internet applications. IEEE Communications Surveys and Tutorials, 3(4), 2000.
Rohit Khare and Adam Rifkin. Weaving a Web of trust. issue of the World Wide Web Journal (Volume 2, Number 3, Pages 77–112), Summer 1997.
Véronique Legrand, Dana Hooshmand, and Stéphane Ubéda. Trusted ambient community for self-securing hybrid networks. Research Report 5027, INRIA, 2003.
Filip Perich, Jeffrey Undercoffer, Lalana Kagal, Anupam Joshi, Timothy Finin, and Yelena Yesha. In reputation we believe: Query processing in mobile ad-hoc networks. mobiquitous, 00:326–334, 2004.
Josep M. Pujol, Ramon Sangüesa, and Jordi Delgado. Extracting reputation in multi agent systems by means of social network topology. In AAMAS [1], pages 467–474.
Daniele Quercia, Stephen Hailes, and Licia Capra. Tata: Towards anonymous trusted authentication. In Ketil Stølen, William H. Winsborough, Fabio Martinelli, and Fabio Massacci, editors, iTrust, volume 3986 of Lecture Notes in Computer Science, pages 313–323. Springer, 2006.
Jordi Sabater and Carles Sierra. Regret: reputation in gregarious societies. In Agents, pages 194–195, 2001.
Jordi Sabater and Carles Sierra. Reputation and social network analysis in multiagent systems. In AAMAS [1], pages 475–482.
Girish Suryanarayana and Richard N. Taylor. A survey of trust management and resource discovery technologies in peer-to-peer applications.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 International Federation for Information Processing
About this paper
Cite this paper
Galice, S., Minier, M., Ubéda, S. (2007). A trust protocol for community collaboration. In: Etalle, S., Marsh, S. (eds) Trust Management. IFIPTM 2007. IFIP International Federation for Information Processing, vol 238. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-73655-6_12
Download citation
DOI: https://doi.org/10.1007/978-0-387-73655-6_12
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-73654-9
Online ISBN: 978-0-387-73655-6
eBook Packages: Computer ScienceComputer Science (R0)